Secure storage and transfer of items is important for sensitive, expensive, or hard-to-replace equipment. In relatively unsecure areas, lack of such security measures may result in equipment loss. Systems exist that track the movement of devices. Systems also exist that track individuals that move equipment. Some of these systems also use a centralized database to track the association of objects with individuals moving the objects.
Systems that track objects and their association with individuals moving the objects, often rely either on manual validation of the identity of the personnel moving objects and whether they have requisite authority to move objects or on electronic tracking of the objects only. Such manual monitoring of movement of objects results in increased overhead to maintain accurate equipment locations, lost equipment and potential operations inefficiencies.
The drawings referenced herein form a part of the specification. Features shown in the drawings are meant as illustrative of exemplary embodiments of the invention.
In the following detailed description of exemplary embodiments of the invention, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration exemplary embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. Other embodiments may be utilized, and logical, mechanical, and other changes may be made without departing from the spirit or scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined by the appended claims.
According to an embodiment of the present invention, electronic tags 130 and 140 may be in the form of Radio Frequency Identification Device (RFID) tags. Such RFID tags may be active or passive. Active RFID tags are self-powered, e.g. battery-powered, and can be detected at a distance of about 10-20 feet. Passive RIFD tags, on the other hand, require close proximity to be read by an antenna. RFID tags include transponders which are capable of transmitting data upon receiving a designated incoming signal.
Referring back to
At block 470, scanning antenna 110 activates the transponder of electronic tag 140 to enable data transfer between electronic tag 140 and scanning antenna 110 and receives information 230 regarding the identity of the individual and information 240. Information 240 includes at least one type of biometric information unique to the individual to whom electronic tag 140 is assigned. System 100 then directs the individual to provide at least one predetermined type of biometric information to biometric scanner 150.
The biometric information obtained from the individual is compared with information 240, which includes at least one type of biometric information unique to the individual to whom electronic tag 140 is assigned (block 490). If the received real time biometric information matches with stored information 240, object 120 and the individual are permitted to leave secure area 105, as at block 510. In an exemplary embodiment of the present invention, the movement of object 120 through secure area 105 is recorded in database 170 for later retrieval. In one embodiment of the present invention, if the received real time biometric information does not match with stored information 240, a restrictive event occurs. An example of such a restrictive event may be triggering of an alarm. Another example may be that the object and the individual may be confined to the secure area by blocking egress from the secure area. In yet another embodiment, the restrictive event may simply be recording the event. In one embodiment of the present invention, if the alarm is triggered, the restrictive event may be recorded in a database for future retrieval (block 520).
In one embodiment of the present invention, system 100 may be in form of a network of transfer points, each of which may be connected to database 170 which would store all the events including the authorized and unauthorized movements of object 10. Database 170 may be at a remote location or it may be locally situated. In another embodiment of the present invention, system 100 may be in the form of non-networked transfer points, each of which is a stand-alone system which scans for presence of object 110, through the presence of electronic tag 130, and identifies and validates the identity of the individual moving object 110 through secure area 105. Data relating to authorized and unauthorized movement of object 110 may be locally recorded for later retrieval. System 100 thus may track object 110, may track who moves object 110, may validate the identity of the individual transferring object 110, may restrict the movement of object 110, and may provide immediate notification in the event of unauthorized movement of object 100.
It is noted that, although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. For example, whereas some embodiments of the invention have been described in relation to a series of check points which are networked to a single remote database, other embodiments of the invention can include stand-alone check points without any central database. This application is thus intended to cover adaptations or variations of the disclosed embodiments of the present invention. Therefore, it is intended that this invention be limited only by the claims and equivalents thereof.